Actual Complete Real Exam Questions & Correct Answers
(Verified Answers) | Already Graded A+ | Newest Exam | Just
Released!!
This algorithm was published in a paper by Ross Anderson as
an improvement on FISH. Anderson showed that Fish was
vulnerable to known plaintext attacks. It is both faster and
stronger than FISH. - ANSWER-PIKE
A number that is used only one time then discarded is called
what?
A Nonce
B Chain
C Salt
D IV - ANSWER-A
Which of the following is a stream cipher that uses variable
length key from 1 to
256
bytes?
A RC4
B AES
,C DESx
D DES - ANSWER-A
This algorithm was published by the German engineering firm
Seimans in 1993.
It is a software based stream cipher using Lagged Fibonacci
generator along
with a concept borrowed from the shrinking
generator ciphers.
A RC4
B
Blowfish
C FISH
D Twofish -
ANSWER-C
Which of the following is NOT required for a hash?
A Minimum key length of 256 bits
B Variable-length input, fixed-length output
C Non-reversible
D Few collisions - ANSWER-A
A ______ refers to a situation where two different inputs yield
the same output.
A Substitution
B Convergence
,C Collision
D Transposition - ANSWER-C
What is a salt?
A Key rotation
B Random bits intermixed with a hash to increase
randomness and reduce
collisions.
C Random bits intermixed with a symmetric cipher to increase
randomness and
make it more
secure.
D Key whitening - ANSWER-B
RFC 1321 describes what hash?
A RIPEMD
B SHA1
C GOST
D MD5 - ANSWER-D
What size block does FORK256 use?
A 256
B 128
, C
512
D 64 -
ANSWER-C
In 1977 researchers at MIT described what asymmetric
algorithm?
A RSA
B AES
C DH
D EC - ANSWER-A
What is the formula (M^e)(%n) related to?
A Encrypting with EC
B Generating Mersenne primes
C Decrypting with RSA
D Encrypting with RSA - ANSWER-C
Which of the following equations is related to EC?
A P =
Cd%n
B
Me%n
C y2 = x3 + Ax
+B